Sciweavers

ISW
2001
Springer
14 years 4 months ago
An Optimistic Non-repudiation Protocol with Transparent Trusted Third Party
Abstract. In this paper we consider a new and efficient optimistic nonrepudiation protocol. In a non-repudiation protocol, during which Alice wants to transmit a message to Bob, Al...
Olivier Markowitch, Steve Kremer
ISW
2001
Springer
14 years 4 months ago
Oblivious Image Watermarking Robust against Scaling and Geometric Distortions
Abstract. Watermarking stays the main technical safeguard of electronic copyright. This paper presents the first public-domain oblivious watermarking scheme for images which survi...
Francesc Sebé, Josep Domingo-Ferrer
ISW
2001
Springer
14 years 4 months ago
An Auditable Metering Scheme for Web Advertisement Applications
This paper proposes a cryptographic mechanism for metering the duration and/or the number of instances of running a data process. This mechanism has the following property: knowing...
Liqun Chen, Wenbo Mao
ISW
2001
Springer
14 years 4 months ago
Suitability of a Classical Analysis Method for E-commerce Protocols
We present the adaptation of our model for the validation of key distribution and authentication protocols to address specific needs of protocols for electronic commerce. The two ...
Sigrid Gürgens, Javier Lopez
ISW
2001
Springer
14 years 4 months ago
Persistent Authenticated Dictionaries and Their Applications
Abstract. We introduce the notion of persistent authenticated dictionaries, that is, dictionaries where the user can make queries of the type “was element e in set S at time t?...
Aris Anagnostopoulos, Michael T. Goodrich, Roberto...
ISW
2001
Springer
14 years 4 months ago
Experimental Testing of the Gigabit IPSec-Compliant Implementations of Rijndael and Triple DES Using SLAAC-1V FPGA Accelerator B
In this paper, we present the results of the first phase of a project aimed at implementing a full suite of IPSec cryptographic transformations in reconfigurable hardware. Full imp...
Pawel Chodowiec, Kris Gaj, Peter Bellows, Brian Sc...
INAP
2001
Springer
14 years 4 months ago
Content-based Management of Document Access Control
Three different security models have been advocated to determine the access rights to documents in a network of computers; DAC, MLS, and RBAC. Each of these models has its strengt...
Edgar Weippl, Ismail Khalil Ibrahim, Werner Winiwa...
INAP
2001
Springer
14 years 4 months ago
A Framework for the Search And Rescue Domain
We describe the software environment that has been developed for the management and support of planning missions in the SAR domain. We have chosen to develop a configurable environ...
Abraham Rodríguez-Rodríguez, Miguel ...
INAP
2001
Springer
14 years 4 months ago
Mining Multi-Dimensional Quantitative Associations
Michal Okoniewski, Lukasz Gancarz, Piotr Gawrysiak
INAP
2001
Springer
14 years 4 months ago
Defeasible Logic
We often reach conclusions partially on the basis that we do not have evidence that the conclusion is false. A newspaper story warning that the local water supply has been contamin...
Donald Nute